Saturday, June 21, 2008

06-12-2008 Seminar

The paper discussed was the Patagonix paper from USENIX Security Symposium 2008. This is a interesting work about using virtualization technique to detect stealthy rootkits. The paper is available from this here .

The slides used in the discussion is available from here.

No comments: